I'm sorry but it seems far-fetched to me. For signCount to be useful
with shared passkeys, the attacker who managed to copy the passkey
and get full access until the true owner logs in again would have to not synchronise the signCount (which they can totally do because they have full access), and it would "only" let the true owner know that the passkey is compromised.
It seems strictly worse than just sending an email saying "your passkey was used from <IP-based geolocation>, wasn't it you?".